Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
SECURITY
ITM 315
Meghana Bhushan
Preview
Protecting against Physical Intrusion
Physical Data Center Security Considerations
Physical Data Center Security Systems
Controlling Threat in the Facility
Benefits of Data Center Security
If you want to break into the back door of a building, drive a car through
the front door
Thumbprint scanner
Facial recognition
Retina scan
Authentication levels
Ubiquitous card key
Smart cards with embedded chip
Proximity key technology
Pin or Password
Conclusion
Therefore, Data center security is mainly about managing risks
Build a highly secure building with a balance:
Confidentiality
Integrity
Access
References
Lawton. S. (2014, December 2). A guide to physical data center security solutions. Retrived from
http://www.tomsitpro.com/articles/physical-data-center-security,2-831-2.html
Scalet. S. D. (2015, March 31). How to build physical security into a data center. Retrieved from
http://www.csoonline.com/article/2112402/physical-security/physical-security-19-ways-to-buildphysical-security-into-a-data-center.html
Data center security: Controlling threat in your facility. (2015, March 3). Retrieved from
http://www.datacenterknowledge.com/archives/2015/03/03/data-center-security-controlling-threat-inyour-facility/
Barker. D. (2012, July 26). A guide to physical security for data centers. Retrieved from
http://www.datacenterjournal.com/a-guide-to-physical-security-for-data-centers/